How to extract workflows from data : process mining - Orizzonti Holding

20 downloads 8849 Views 2MB Size Report
PROCESS MINING is as a research “to discover, monitor and improve ... CONCEPT ... Extraction of hidden information and relations from data. DATA MINING ...
How to extract workflows from data : process mining M.T. D’Alessandro, G. Gaudiano, G. Viola, V. Santarcangelo

What is Process Mining PROCESS MINING is as a research “to discover, monitor and improve real process (i.e., not assumed processes) by extracting knowledge from event logs readily available in today’s system” [W. van der Aalst]

PROCESS MINING STEPS Process mining aims to

Design a Process Model (Discovery Mining)

[W. van der Aalst]

PROCESS MINING STEPS

Identify the differences between a real process and a model (Conformance Checking)

PROCESS MINING STEPS

Extend and improve the devised process model (Enhancement)

BIG CONCEPT PROCESS MINING IS NOT DATA MINING

DATA MINING

Extraction of hidden information and relations from data

DATASET

DATA MINING

HIDDEN RELATIONS

DATA MINING VS PROCESS MINING

LOG

PROCESS MINING

WORKFLOW REAL

1. PROCESS MINING WITH WEKA Example on FILESHARING LOG

Dataset’s attributes Distribution of the values of the attributes

TREE EXTRACTION on the relation USER/OPERATION

EDIT DELETE

INSERT

us15

us8

us28

2. PROCESS MINING WITH PROM EXAMPLE ON OTP Log

LOG EXAMPLE events

concepts

time

Process Mining is based on •CONCEPTS (e.g. users) •EVENTS (e.g. activities) •TIME

PROCESS MINING ALGORITHM

Event (activity) concepts (user)

WORKFLOW

PETRI NET

Process Mining VS ISO STANDARDS

AN EXAMPLE OF APPLICATION

Maintenance Extinguishers process

WHY ARE OSCILLATING THESE PERFORMANCES?

›From Eugenio/PassPartout -> LOG -> WORKFLOWS › ›From L’Antincendio App -> LOG -> WORKFLOWS

›Workflow about real process ›VS ›ISO 9001 Procedures

PROCESS GAP > ENHANCEMENT •Underestimation of the Work Plans imparted by the specialist coordinator of maintainers •Incorrect completion of the work plans by those who have made ​the intervention

“Process Mining can be Business Plus”

WORK IN PROGRESS FUTURE WORK

WHY A KRYPTOLOCKER HAS DAMAGED MY COMPANY? What is Kryptolocker? User Behaviour on IT System PROCESS GAP

ISO 27001 Procedures

ISO 27000 : Fundamentals and vocabulary ISO 27001 : ISMS Requirements (normative) ISO 27002 : ISMS Code of practice (guide)

ISO 27001’s Annex A list of 114 controls /best practices (35 control objectives, 14 key points from A.5 to A.18)

ISO 27001 Procedures A.8 Asset management – controls related to inventory of assets and acceptable use, also for information classification and media handling A.9 Access control – controls for Access control policy, user access management, system and application access control, and user responsibilities

A.12 Operational security – lots of controls related to management of IT production: change management, capacity management, malware, backup, logging, monitoring, installation, vulnerabilities, etc. A.13 Communications security – controls related to network security, segregation, network services, transfer of information, messaging, etc.

SECURITY LOGS

SYSTEM LOG

THANKS! Any questions? You can find me at: http://www.researchgate.net/profile/Vito_Santarcangelo

Credits Special thanks to all the people who made and released these awesome resources for free: › Presentation template by SlidesCarnival › Photographs by Startupstockphotos

Suggest Documents